1
Descripción:
“... for committing fraud in computer systems with the use of new technologies. This article describes, in general...”